{"id":69000,"date":"2023-07-19T12:12:58","date_gmt":"2023-07-19T04:12:58","guid":{"rendered":"https:\/\/version-2.com\/?p=69000"},"modified":"2023-07-19T14:25:56","modified_gmt":"2023-07-19T06:25:56","slug":"cyber-hygiene-preventing-data-breaches","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/07\/cyber-hygiene-preventing-data-breaches\/","title":{"rendered":"Cyber Hygiene: Preventing Data Breaches"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"69000\" class=\"elementor elementor-69000\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2023\/07\/Cyber-hygiene-keys-to-protect-your-data.jpg\" width=\"980\" height=\"536\" \/><\/p><div class=\"entry-content\"><p>Since the Covid pandemic began, the word \u201chygiene\u201d has ceased to be only for germaphobes and has become the holy grail of health.<\/p><p>Washing hands and wearing masks has become as normal as breathing (literally).<\/p><p>But did you know that <a href=\"https:\/\/ehorus.com\/en\/digitalization\/?__hstc=50841782.aa6b2ac8c92f3fc1fd254c08e49ff173.1688978765321.1688978765321.1689566979064.2&amp;__hssc=50841782.4.1689566979064&amp;__hsfp=534306010\" target=\"_blank\" rel=\"noreferrer noopener\">your computer system<\/a>s also need some love and hygienic attention?<\/p><p>That\u2019s right!\u00a0<\/p><p><strong>Cyber hygiene is the new mantra<\/strong> to keep your data and networks healthy and safe from cyberattacks.<\/p><p>So, get ready to discover the <strong>7 best practices that will help you keep your organization safe from cyber chaos. <\/strong>Because if your net fails, there is no disinfectant to save you.<\/p><h2 class=\"wp-block-heading\">Cyber hygiene keys to protect your data<\/h2><h3 class=\"wp-block-heading\">1) Monitor and control your inventory as if you were Big Brother!<\/h3><p>If you don\u2019t know what you have, then you have no idea what you\u2019re protecting.<\/p><p>To make sure your data is safer than Fort Knox, you need to keep a watchful eye on all the junk and software in your company.<\/p><p>Yes, even those devices brought by your enthusiastic employee on \u201cBring Your Own Device Day.\u201d<\/p><p>Document everything from the software they use to the color of the cables.<\/p><p>If you detect suspicious software, <strong>sound the alarm<\/strong> and make sure to keep track of every hardware failure.<\/p><p>Don\u2019t give cyber villains a break!<\/p><h3 class=\"wp-block-heading\">2) Don\u2019t be a slacker, patch that software at once!<\/h3><p>Did you know that outdated software is the \u201cwinter refuge\u201d of <strong>cybercriminals<\/strong>?<\/p><p>According to a study (totally scientific, of course) conducted by the Ponemon Institute in 2020, 42% of data breaches were caused by the laziness of not applying available patches.<\/p><p>Hackers are out there looking for outdated software to sneak into your network.<\/p><p>Don\u2019t welcome them!<\/p><p>You need a process that reviews and updates all your software in the background, without upsetting your brave end users.<\/p><h3 class=\"wp-block-heading\">3) Back up, don\u2019t be a (data) loser!<\/h3><p>Losing data is as painful as breaking a mirror with your head while an umbrella opens from your mouth (seven years of bad luck included).<\/p><p>Not only can users unintentionally delete files, there are also hardware issues, power outages, and those ruthless malware attacks.<\/p><p>Ransomware, for example, is like virtual hijacking, they ask you for ransom for your data! <strong>Save your company time, money and tears by making regular backups.<\/strong><\/p><p>Automate the whole process to avoid human error and maintain a backup program with the precision of a Swiss watch!<\/p><h3 class=\"wp-block-heading\">4) Do not give permissions to anyone, be fussier than your father with culinary innovations!<\/h3><p>Humans are the cause of 95% of cybersecurity problems, according to the prestigious \u201cObviously\u201d World Institute.<\/p><p>So, if you don\u2019t want your network to be as safe as an unlocked door, you need to carefully control who has access to what.<br \/>Manage user permissions as if you were a guardian of Death Star 4 who does not want the slaughter of 1, 2, and 3* to be repeated.<\/p><p>But wait, assigning permissions manually is a slow and boring process. Instead, use an IT management solution that does all the dirty work for you and automatically assigns usage rights.<\/p><p><em>*Yes, there is a third in the last Star Wars trilogy.<\/em><\/p><h3 class=\"wp-block-heading\">5) Say goodbye to \u201c123456\u201d and welcome strong passwords!<\/h3><p>According to a (very scientific) survey conducted by Google in 2019, <strong>65% of users use the same password for everything.<\/strong><\/p><p>Even IT professionals are to blame for this digital laziness!<\/p><p>Do you want hackers to crash your network? Of course not.<\/p><p>Raise awareness among users about strong passwords and the importance of changing them regularly.<\/p><p>But come on, let\u2019s face it, nobody likes to rack their brains thinking about complicated passwords and then forgetting them instantly. Use a password manager to automatically generate strong passwords and store them in an encrypted database.<\/p><h3 class=\"wp-block-heading\">6) Multi-Factor authentication for hackers to cry virtual tears!<\/h3><p>Passwords are actually like play dough locks in the digital age, <strong>easy to open for evil hackers!<\/strong><\/p><p>So don\u2019t just rely on them to protect your data. Implement Multi-Factor Authentication (MFA) and make hackers rip off virtual hairs of frustration.<\/p><p>Ask users to verify their identity through different factors, such as one-time passwords sent by text or email, personal security questions, or even facial recognition.<\/p><p>Make hackers feel it\u2019s easier to climb mount Everest with a pressure cooker on your head heating lentils than it is to get into your network!<\/p><h3 class=\"wp-block-heading\">7) Don\u2019t play Russian cyber roulette, use a cybersecurity solution!<\/h3><p>There are many cybersecurity options out there, but here are a few key points to consider:<\/p><p>Find <strong>a solution that can detect known and unknown threats.<\/strong> In addition, you need a solution that can automatically repair any infection and clean up any traces of malware. Make sure it\u2019s compatible with all your devices and operating systems, because you don\u2019t want to leave anyone unprotected. And of course, make sure it\u2019s lightweight and doesn\u2019t slow down your devices.<\/p><h2 class=\"wp-block-heading\">Conclusions<\/h2><p>If you want to <strong>save time and effort<\/strong>, consider adopting a cybersecurity framework.<\/p><p>Rely on the collective wisdom of thousands of professionals and let their expertise guide you in implementing a robust cybersecurity program.<\/p><p>Because honestly, who has the time to reinvent the wheel of cybersecurity?<\/p><p>Remember, maintaining proper cyber hygiene does as much good as washing your hands after you\u2019ve helped give birth to a cow in the herd.<\/p><p>So, follow these 7 golden keys and keep cybercriminals at bay.<\/p><p>Don\u2019t let them infect you with the cybernetic neglect virus.<\/p><p>Your network and data will thank you!\u00a0<\/p><div class=\"saboxplugin-wrap\"><div class=\"saboxplugin-tab\"><div class=\"saboxplugin-gravatar\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2020\/10\/pandorafms-cockpit-e1601301802322.jpg\" width=\"308\" height=\"266\" \/><br \/><noscript><img decoding=\"async\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2020\/10\/pandorafms-cockpit-e1601301802322.jpg\" width=\"100\" height=\"100\" alt=\"\" itemprop=\"image\" data-eio=\"l\"><\/noscript><\/div><div class=\"saboxplugin-authorname\"><a class=\"vcard author\" href=\"https:\/\/pandorafms.com\/blog\/author\/dimas\/\" rel=\"author\"><span class=\"fn\">Dimas Pardo<\/span><\/a><\/div><div class=\"saboxplugin-desc\"><div><p>Dimas P.L., de la lejana y ex\u00f3tica Vega Baja, CasiMurcia, periodista, redactor, taumaturgo del contenido y campe\u00f3n de espantar palomas en los parques. Actualmente resido en Madrid donde trabajo como palad\u00edn de la comunicaci\u00f3n en Pandora FMS y periodista freelance cultural en cualquier medio que se ofrezca. Tambi\u00e9n me vuelvo loco escribiendo y recitando por los c\u00edrculos po\u00e9ticos m\u00e1s profundos y oscuros de la ciudad.<\/p><p>Dimas P.L., from the distant and exotic Vega Baja, CasiMurcia, journalist, editor, thaumaturgist of content and champion of scaring pigeons in parks. I currently live in Madrid where I work as a communication champion in Pandora FMS and as a freelance cultural journalist in any media offered. I also go crazy writing and reciting in the deepest and darkest poetic circles of the city.<\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"38636\" class=\"elementor elementor-38636\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7400e5a2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7400e5a2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;58112d0&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-131f5cf2\" data-id=\"131f5cf2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1114ae95 elementor-widget elementor-widget-text-editor\" data-id=\"1114ae95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About PandoraFMS<\/strong><br>\nPandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.<br>\nOf course, one of the things that Pandora FMS can control is the hard disks of your computers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Since the Covid pandemic began, the word \u201chygiene\u201d has  [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[474,1075,61],"tags":[475,1076],"class_list":["post-69000","post","type-post","status-publish","format-standard","hentry","category-pandorafms","category-year2023","category-press-release","tag-pandorafms","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Hygiene: Preventing Data Breaches - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Hygiene: Preventing Data Breaches - Version 2\" \/>\n<meta property=\"og:description\" content=\"Since the Covid pandemic began, the word \u201chygiene\u201d has [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-19T04:12:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-19T06:25:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2023\/07\/Cyber-hygiene-keys-to-protect-your-data.jpg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/cyber-hygiene\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/cyber-hygiene-preventing-data-breaches\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Cyber Hygiene: Preventing Data Breaches\",\"datePublished\":\"2023-07-19T04:12:58+00:00\",\"dateModified\":\"2023-07-19T06:25:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/cyber-hygiene-preventing-data-breaches\\\/\"},\"wordCount\":1058,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/cyber-hygiene\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Cyber-hygiene-keys-to-protect-your-data.jpg\",\"keywords\":[\"Pandorafms\",\"2023\"],\"articleSection\":[\"PandoraFMS\",\"2023\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pandorafms.com\\\/blog\\\/cyber-hygiene\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/cyber-hygiene-preventing-data-breaches\\\/\",\"url\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/cyber-hygiene\\\/\",\"name\":\"Cyber Hygiene: Preventing Data Breaches - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/cyber-hygiene\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/cyber-hygiene\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Cyber-hygiene-keys-to-protect-your-data.jpg\",\"datePublished\":\"2023-07-19T04:12:58+00:00\",\"dateModified\":\"2023-07-19T06:25:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/cyber-hygiene\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pandorafms.com\\\/blog\\\/cyber-hygiene\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/cyber-hygiene\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Cyber-hygiene-keys-to-protect-your-data.jpg\",\"contentUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Cyber-hygiene-keys-to-protect-your-data.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/cyber-hygiene\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Hygiene: Preventing Data Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Hygiene: Preventing Data Breaches - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Hygiene: Preventing Data Breaches - Version 2","og_description":"Since the Covid pandemic began, the word \u201chygiene\u201d has [&hellip;]","og_url":"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/","og_site_name":"Version 2","article_published_time":"2023-07-19T04:12:58+00:00","article_modified_time":"2023-07-19T06:25:56+00:00","og_image":[{"url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2023\/07\/Cyber-hygiene-keys-to-protect-your-data.jpg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/07\/cyber-hygiene-preventing-data-breaches\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Cyber Hygiene: Preventing Data Breaches","datePublished":"2023-07-19T04:12:58+00:00","dateModified":"2023-07-19T06:25:56+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/07\/cyber-hygiene-preventing-data-breaches\/"},"wordCount":1058,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2023\/07\/Cyber-hygiene-keys-to-protect-your-data.jpg","keywords":["Pandorafms","2023"],"articleSection":["PandoraFMS","2023","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pandorafms.com\/blog\/cyber-hygiene\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/07\/cyber-hygiene-preventing-data-breaches\/","url":"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/","name":"Cyber Hygiene: Preventing Data Breaches - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/#primaryimage"},"image":{"@id":"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2023\/07\/Cyber-hygiene-keys-to-protect-your-data.jpg","datePublished":"2023-07-19T04:12:58+00:00","dateModified":"2023-07-19T06:25:56+00:00","breadcrumb":{"@id":"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pandorafms.com\/blog\/cyber-hygiene\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/#primaryimage","url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2023\/07\/Cyber-hygiene-keys-to-protect-your-data.jpg","contentUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2023\/07\/Cyber-hygiene-keys-to-protect-your-data.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/pandorafms.com\/blog\/cyber-hygiene\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Hygiene: Preventing Data Breaches"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hWU","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/69000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=69000"}],"version-history":[{"count":13,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/69000\/revisions"}],"predecessor-version":[{"id":69201,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/69000\/revisions\/69201"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=69000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=69000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=69000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}